Abstract:
The possibility of formalization of the problem on estimating the vulnerability of the system components, including their attractiveness to cybercriminals is studied. The four main components of the formalized model are identified; a table of expert assessments of the vulnerability of these components from the side of each group of threats at different stages of the life cycle is designed. The obtained table of assessments can be used as an initial approximation of vulnerability for different objects of protection.
Keywords:threats to information security, assessment of probabilities, degree of attraction, life cycle.